Obsidian/200. Library Papers/chekoleEnforcingMemorySafety2018.md

84 lines
2.5 KiB
Markdown
Executable File
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
readstatus: false
dateread:
title: "Enforcing Memory Safety in Cyber-Physical Systems"
year: 2018
authors:
- "Chekole, Eyasu Getahun"
- "Castellanos, John Henry"
- "Ochoa, Martín"
- "Yau, David K. Y."
- "Katsikas, Sokratis K."
- "Cuppens, Frédéric"
- "Cuppens, Nora"
- "Lambrinoudakis, Costas"
- "Kalloniatis, Christos"
- "Mylopoulos, John"
- "Antón, Annie"
- "Gritzalis, Stefanos"
DOI: "10.1007/978-3-319-72817-9_9"
ISBN: "978-3-319-72817-9"
citekey: "chekoleEnforcingMemorySafety2018"
itemType: "conferencePaper"
publisher: "Springer International Publishing"
location: "Cham"
pages: 127-144
---
#### DOI
[10.1007/978-3-319-72817-9_9](https://doi.org/10.1007/978-3-319-72817-9_9)
#### ISBN
[978-3-319-72817-9](https://www.isbnsearch.org/isbn/978-3-319-72817-9)
### Tags:
**Contribution**::
**Related**::
> [!LINK]
>.
> [!Abstract]
>
> Cyber-Physical Systems (CPS) integrate computations and communications with physical processes and are being widely adopted in various application areas. However, the increasing prevalence of cyber attacks targeting them poses a growing security concern. In particular, attacks exploiting memory-safety vulnerabilities constitute a major attack vector against CPS, because embedded systems often rely on unsafe but fast programming languages to meet their hard time constraints. A wide range of countermeasures has been developed to provide protection against these attacks. However, the most reliable countermeasures incur in high runtime overheads. In this work, we explore the applicability of strong countermeasures against memory-safety attacks in the context of realistic Industrial Control Systems (ICS). To this end, we design an experimental setup, based on a secure water treatment plant (SWaT) to empirically measure the memory safety overhead (MSO) caused by memory-safe compilation of the Programmable Logic Controller (PLC). We then quantify the tolerability of this overhead in terms of the expected real-time constraints of SWaT. Our results show high effectiveness of the security measure in detecting memory-safety violations and a MSO (197.86 $$\upmu \text {s}$$per scan-cycle) that is also tolerable for the SWaT simulation. We also discuss how different parameters impact the execution time of PLCs and the resulting absolute MSO.
>.
>
# Notes
>.
# Annotations%% begin annotations %%
%% end annotations %%
%% Import Date: 2024-08-08T14:35:33.371-04:00 %%